Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-7
|
Results: 7
CRYPTANALYSIS OF MULTIPLE-MODES OF OPERATION
Authors:
BIHAM E
Citation:
E. Biham, CRYPTANALYSIS OF MULTIPLE-MODES OF OPERATION, Journal of cryptology, 11(1), 1998, pp. 45-58
AN IMPROVEMENT OF DAVIES ATTACK ON DES
Authors:
BIHAM E BIRYUKOV A
Citation:
E. Biham et A. Biryukov, AN IMPROVEMENT OF DAVIES ATTACK ON DES, Journal of cryptology, 10(3), 1997, pp. 195-205
BOUNDS ON INFORMATION AND THE SECURITY OF QUANTUM CRYPTOGRAPHY
Authors:
BIHAM E MOR T
Citation:
E. Biham et T. Mor, BOUNDS ON INFORMATION AND THE SECURITY OF QUANTUM CRYPTOGRAPHY, Physical review letters, 79(20), 1997, pp. 4034-4037
SECURITY OF QUANTUM CRYPTOGRAPHY AGAINST COLLECTIVE ATTACKS
Authors:
BIHAM E MOR T
Citation:
E. Biham et T. Mor, SECURITY OF QUANTUM CRYPTOGRAPHY AGAINST COLLECTIVE ATTACKS, Physical review letters, 78(11), 1997, pp. 2256-2259
QUANTUM CRYPTOGRAPHIC NETWORK-BASED ON QUANTUM MEMORIES
Authors:
BIHAM E HUTTNER B MOR T
Citation:
E. Biham et al., QUANTUM CRYPTOGRAPHIC NETWORK-BASED ON QUANTUM MEMORIES, Physical review. A, 54(4), 1996, pp. 2651-2658
DIFFERENTIAL CRYPTANALYSIS OF LUCIFER
Authors:
BENAROYA I BIHAM E
Citation:
I. Benaroya et E. Biham, DIFFERENTIAL CRYPTANALYSIS OF LUCIFER, Journal of cryptology, 9(1), 1996, pp. 21-34
NEW TYPES OF CRYPTANALYTIC ATTACKS USING RELATED KEYS
Authors:
BIHAM E
Citation:
E. Biham, NEW TYPES OF CRYPTANALYTIC ATTACKS USING RELATED KEYS, Journal of cryptology, 7(4), 1994, pp. 229-246
Risultati:
1-7
|